{"id":"https://openalex.org/W2737644180","doi":"https://doi.org/10.1145/3008662","title":"Exploring and Analyzing the Tor Hidden Services Graph","display_name":"Exploring and Analyzing the Tor Hidden Services Graph","publication_year":2017,"publication_date":"2017-07-24","ids":{"openalex":"https://openalex.org/W2737644180","doi":"https://doi.org/10.1145/3008662","mag":"2737644180"},"language":"en","primary_location":{"id":"doi:10.1145/3008662","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3008662","pdf_url":null,"source":{"id":"https://openalex.org/S131231701","display_name":"ACM Transactions on the Web","issn_l":"1559-1131","issn":["1559-1131","1559-114X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on the Web","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5006496977","display_name":"Massimo Bernaschi","orcid":"https://orcid.org/0000-0003-3661-9836"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Massimo Bernaschi","raw_affiliation_strings":["IAC-CNR, Rome, Italy"],"affiliations":[{"raw_affiliation_string":"IAC-CNR, Rome, Italy","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5005168115","display_name":"Alessandro Celestini","orcid":"https://orcid.org/0000-0002-8493-4550"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Alessandro Celestini","raw_affiliation_strings":["IAC-CNR, Rome, Italy"],"affiliations":[{"raw_affiliation_string":"IAC-CNR, Rome, Italy","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5053439134","display_name":"Stefano Guarino","orcid":"https://orcid.org/0000-0002-1545-7711"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Stefano Guarino","raw_affiliation_strings":["IAC-CNR, Rome, Italy"],"affiliations":[{"raw_affiliation_string":"IAC-CNR, Rome, Italy","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5053363798","display_name":"Flavio Lombardi","orcid":"https://orcid.org/0000-0003-0723-7847"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Flavio Lombardi","raw_affiliation_strings":["IAC-CNR, Rome, Italy"],"affiliations":[{"raw_affiliation_string":"IAC-CNR, Rome, Italy","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5006496977"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":1.8645,"has_fulltext":false,"cited_by_count":28,"citation_normalized_percentile":{"value":0.89136202,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":"11","issue":"4","first_page":"1","last_page":"26"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7847825288772583},{"id":"https://openalex.org/keywords/anonymity","display_name":"Anonymity","score":0.6593700051307678},{"id":"https://openalex.org/keywords/graph","display_name":"Graph","score":0.5165051817893982},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.4711250960826874},{"id":"https://openalex.org/keywords/web-service","display_name":"Web service","score":0.4594346880912781},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.4421088397502899},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.42471441626548767},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.4190056622028351},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.4117625951766968},{"id":"https://openalex.org/keywords/information-retrieval","display_name":"Information retrieval","score":0.38831445574760437},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.16644158959388733}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7847825288772583},{"id":"https://openalex.org/C178005623","wikidata":"https://www.wikidata.org/wiki/Q308859","display_name":"Anonymity","level":2,"score":0.6593700051307678},{"id":"https://openalex.org/C132525143","wikidata":"https://www.wikidata.org/wiki/Q141488","display_name":"Graph","level":2,"score":0.5165051817893982},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.4711250960826874},{"id":"https://openalex.org/C35578498","wikidata":"https://www.wikidata.org/wiki/Q193424","display_name":"Web service","level":2,"score":0.4594346880912781},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4421088397502899},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.42471441626548767},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.4190056622028351},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4117625951766968},{"id":"https://openalex.org/C23123220","wikidata":"https://www.wikidata.org/wiki/Q816826","display_name":"Information retrieval","level":1,"score":0.38831445574760437},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.16644158959388733},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3008662","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3008662","pdf_url":null,"source":{"id":"https://openalex.org/S131231701","display_name":"ACM Transactions on the Web","issn_l":"1559-1131","issn":["1559-1131","1559-114X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on the Web","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6299999952316284,"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":39,"referenced_works":["https://openalex.org/W268795945","https://openalex.org/W1514527998","https://openalex.org/W1545050218","https://openalex.org/W1594777977","https://openalex.org/W1655958391","https://openalex.org/W1989993068","https://openalex.org/W1994727615","https://openalex.org/W1998954244","https://openalex.org/W2002363566","https://openalex.org/W2031211716","https://openalex.org/W2042577993","https://openalex.org/W2056524697","https://openalex.org/W2063697083","https://openalex.org/W2063943022","https://openalex.org/W2070176704","https://openalex.org/W2080429359","https://openalex.org/W2094140553","https://openalex.org/W2102931907","https://openalex.org/W2115579680","https://openalex.org/W2127800791","https://openalex.org/W2129620481","https://openalex.org/W2138683822","https://openalex.org/W2142955537","https://openalex.org/W2147344024","https://openalex.org/W2148317291","https://openalex.org/W2148606196","https://openalex.org/W2150596521","https://openalex.org/W2163007546","https://openalex.org/W2175110005","https://openalex.org/W2182209354","https://openalex.org/W2243167037","https://openalex.org/W2258998514","https://openalex.org/W2266987713","https://openalex.org/W2269520727","https://openalex.org/W2283045161","https://openalex.org/W2417359092","https://openalex.org/W2965478150","https://openalex.org/W4245702232","https://openalex.org/W4312512934"],"related_works":["https://openalex.org/W1997775730","https://openalex.org/W1966494590","https://openalex.org/W3023934611","https://openalex.org/W2157186778","https://openalex.org/W1993929477","https://openalex.org/W2033319591","https://openalex.org/W2082747743","https://openalex.org/W2071573776","https://openalex.org/W2942963309","https://openalex.org/W2195062863"],"abstract_inverted_index":{"The":[0,47,123],"exploration":[1],"and":[2,19,37,44,74,120,172,187],"analysis":[3,158,167],"of":[4,17,27,34,49,59,72,105,131,147,159,168,179],"Web":[5,108,141,185],"graphs":[6],"has":[7,53],"flourished":[8],"in":[9],"the":[10,24,28,32,50,57,60,69,103,106,115,145,160,183],"recent":[11],"past,":[12],"producing":[13],"a":[14,136,155,164,175],"large":[15],"number":[16],"relevant":[18],"interesting":[20,177],"research":[21,51],"results.":[22],"However,":[23],"unique":[25],"characteristics":[26],"Tor":[29,61,78,93,107,140,153,184],"network":[30],"limit":[31],"applicability":[33],"standard":[35],"techniques":[36,89],"demand":[38],"for":[39,90,151],"specific":[40],"algorithms":[41],"to":[42,66],"explore":[43],"analyze":[45],"it.":[46],"attention":[48],"community":[52],"focused":[54],"on":[55,75,114,138],"assessing":[56],"security":[58],"infrastructure":[62],"(i.e.,":[63],"its":[64,134],"ability":[65],"actually":[67],"provide":[68],"intended":[70],"level":[71],"anonymity)":[73],"discussing":[76],"what":[77],"is":[79,100,112],"currently":[80],"being":[81],"used":[82],"for.":[83],"Since":[84],"there":[85],"are":[86,189],"no":[87,98],"foolproof":[88],"automatically":[91],"discovering":[92],"hidden":[94,161,169],"services,":[95],"little":[96],"or":[97],"information":[99],"available":[101],"about":[102],"topology":[104],"graph.":[109],"Even":[110],"less":[111],"known":[113],"relationship":[116],"between":[117],"content":[118,188],"similarity":[119],"topological":[121],"structure.":[122],"present":[124],"article":[125],"aims":[126],"at":[127],"addressing":[128],"such":[129],"lack":[130],"information.":[132],"Among":[133],"contributions:":[135],"study":[137],"automatic":[139],"exploration/data":[142],"collection":[143],"approaches;":[144],"adoption":[146],"novel":[148,156,180],"representative":[149],"metrics":[150],"evaluating":[152],"data;":[154],"in-depth":[157],"services":[162],"graph;":[163],"rich":[165],"correlation":[166],"services\u2019":[170],"semantics":[171],"topology.":[173],"Finally,":[174],"broad":[176],"set":[178],"insights/considerations":[181],"over":[182],"organization":[186],"provided.":[190]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":5},{"year":2022,"cited_by_count":5},{"year":2021,"cited_by_count":6},{"year":2020,"cited_by_count":4},{"year":2019,"cited_by_count":3},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":1}],"updated_date":"2026-03-03T08:47:05.690250","created_date":"2025-10-10T00:00:00"}
